Chosen ciphertext attacks on latticebased public key encryption and modern (non?quantum) cryptography in a quantum environrnent[J]. Theoretical Computer Science, 2006, 367(3): 308-323.Izmerly, O., Mor, T.: Chosen ciphertext attacks on lattice-based public key encryption and modern (non-...
Block CipherAESRelated-KeyChosen-KeyWhile the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open problem how to design a key-schedule for block ciphers, as shown by the numerous candidates broken in the ...
Block cipherdifferential attackopen-key distinguisherCryptonHierocryptSAFERSquareIn this paper we investigate the differential properties of block ciphers in hash function modes of operation. First we show the impact of differential trails for block ciphers on collision attacks for various hash function ...
In this paper, we study the AES block cipher in the chosen-key setting. The adversary's goal of this security model is to find triplets (m,m′,k) satisfying some properties more efficiently for the AES scheme than generic attacks. It is a restriction of the classical chosen-key model, ...
In recent years, much attention has been focused on designing provably secure PKE in the presence of key-leakage and almost all the constructions rely on an important building block namely hash proof system (HPS). However, in the setting of adaptive chosen-ciphertext attacks (CCA2), there ...
, Zhao, Y. : ‘ Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks ’, in: Dawson, E. (Ed.), CT-RSA , 2013 ( LNCS , 7779 ) , pp. 84 – 100 .Liu S, Weng J, Zhao Y. Efficient public key cryptosystem resilient to key leakage chosen ciphertext ...
选择密文安全性密码协议The public key cryptosystem secure against chosen ciphertext attacks is a very strong secure cryptosystem and is a useful primitive for designing protocols that resisting active adversary. This paper surveys the main results about its construction and applications available in the ...
To deal with active attacks in public key encryptions, the notion of security against an adaptive chosen ciphertext attack has been defined by Researchers. If an adversary can inject messages into a network, these messages may be ciphertexts, and the adversary may be able to extract partial ...
In this paper, we study the AES block cipher in the chosen-key setting. The adversary's goal of this security model is to find triplets ( m , m ′, k ) satisfying some properties more efficiently for the AES scheme than generic attacks. It is a restriction of the classical chosen-key...
Block CipherAESRelated-KeyChosen-KeyWhile the symmetric-key cryptography community has now a good experience on how to build a secure and efficient fixed permutation, it remains an open problem how to design a key-schedule for block ciphers, as shown by the numerous candidates broken in the ...